GUI tool to create ROP chains using the ropper API
☆159Mar 30, 2018Updated 7 years ago
Alternatives and similar repositories for ropa
Users that are interested in ropa are comparing it to the libraries listed below
Sorting:
- A set of exploitation/reversing aids for IDA☆421Nov 28, 2017Updated 8 years ago
- ☆91Jul 31, 2019Updated 6 years ago
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- Small tool for generating ropchains using unicorn and z3☆198Feb 22, 2018Updated 8 years ago
- rVMI - A New Paradigm For Full System Analysis☆359Oct 4, 2017Updated 8 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆216Feb 2, 2018Updated 8 years ago
- VirtualBox 3D exploits & PoCs☆162Jan 24, 2019Updated 7 years ago
- PowerShell oneliner to retrieve wdigest passwords from the memory☆220Dec 11, 2017Updated 8 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆53Dec 21, 2017Updated 8 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- A tool for checking exploitability☆210May 31, 2019Updated 6 years ago
- ROP based Movfuscator VM☆28Nov 3, 2016Updated 9 years ago
- Linux Heap Exploitation Practice☆395Dec 1, 2018Updated 7 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆302Jan 12, 2023Updated 3 years ago
- ☆522Feb 22, 2020Updated 6 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- extending IDA's string navigation capabilities☆174Oct 25, 2020Updated 5 years ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆172Sep 27, 2017Updated 8 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆156Apr 1, 2018Updated 7 years ago
- A Javascript library for browser exploitation☆894Feb 12, 2019Updated 7 years ago
- some challenge of hctf2017☆11Nov 14, 2017Updated 8 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Apr 9, 2018Updated 7 years ago
- poc or exp of android vulnerability☆407Dec 30, 2017Updated 8 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆287May 24, 2016Updated 9 years ago
- A collection of vulnerable ARM binaries for practicing exploit development☆930Nov 15, 2021Updated 4 years ago
- Attacking the Core associated source files☆89Dec 13, 2017Updated 8 years ago
- Analysis of public exploits or my 1day exploits☆617Oct 1, 2020Updated 5 years ago
- A tool to help you write binary exploits☆610Feb 21, 2019Updated 7 years ago
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆116Mar 25, 2019Updated 6 years ago
- Tutorial for writing kernel exploits☆256Aug 10, 2025Updated 6 months ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆91Feb 15, 2019Updated 7 years ago
- ☆627Jan 20, 2023Updated 3 years ago
- A Python tool to generate ROP chains☆65Feb 1, 2025Updated last year
- ☆113Jun 12, 2017Updated 8 years ago
- Visualization of heap operations.☆617Dec 5, 2024Updated last year
- r2con 2017 September 6-9☆97Oct 23, 2017Updated 8 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆633Jun 20, 2017Updated 8 years ago
- Decompiler for x86 and x86-64 ELF binaries☆220Apr 16, 2019Updated 6 years ago